نتایج جستجو برای: source routing

تعداد نتایج: 467348  

Journal: :CoRR 2018
Xiaoyang Zhong Yao Liang

In this paper, we study the downward routing for network control/actuation in large-scale and heterogeneous wireless sensor networks (WSNs) and Internet of Things (IoT). We propose the Opportunistic Source Routing (OSR), a scalable and reliable downward routing protocol for WSNs/IoT. OSR introduces opportunistic routing into traditional source routing based on the parent set of a node’s upward ...

2003
Shweta Bhandare Sheetalkumar Doshi Timothy X. Brown Sagar Sanghani

In this paper, we compare the Dynamic Source Routing (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation of the routing protocols is carried out using the Click modular router infrastructure on laptops with wireless ethernet cards running Linux. We demonstrate the working of both ad hoc routing protocols through our experiments and highlight the energ...

2012
R.Rajamohamed V. Rajamani

In MANETs, there are many routing protocols like table-driven and on-demand routing protocols. Among these protocols, on-demand routing protocols are very sensitive in achieving the major challenges of MANET such as routing, security, bandwidth, quality of service and reliability and so on. The most popular on-demand routing protocols are Ad-hoc On-demand Distance Vector (AODV), Dynamic Source ...

2002
B. Haberman

The definitions of IGMPv3 and MLDv2 require new behavior within the multicast routing protocols. The additional source information contained in IGMPv3 and MLDv2 messages necessitates multicast routing protocols to manage and utilize the information. This document will describe how multicast routing protocols will interact with these source-filtering group management protocols.

2005
C. Venkatesh N. Yadaiah A. M. Natarajan

DYNAMIC SOURCE ROUTING PROTOCOL USING FUZZY LOGIC CONCEPTS FOR AD HOC NETWORKS C. Venkatesh , N. Yadaiah and A.M. Natarajan Kongu Engineering College, Perundurai, Tamil Nadu – 638052, [email protected] # Dept. of EEE, Jawaharlal Nehru Technological University, Hyderabad-500 072, [email protected] Abstract This paper presents a Dynamic Source Routing Protocol using Self Healing and Optimizing ...

1997
Wei Huang Andrew B. Kahng

We describe a \topology advisor" for routing of critical (multi-source) buses in building-block design. The tool accepts as input a block layout, a two-layer routing cost structure superposed over the block layout, terminal locations for a multi-source bus, and source-sink delay upper bound (linear or Elmore delay) constraints for all terminal pairs. The b best routing solutions (b a user param...

2009
Shinya Ito Kenji Yoshigoe

This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs). CETAR makes routing decision using statistics of the energy consumed for each type of node activities including sensing, data processing, data transmission as a...

2009
Fujian Qin Youyuan Liu

Multipath routing allows the establishment of multiple paths between a pair of source and destination node in mobile ad hoc network. It is typically proposed in order to increase the reliability of data transmission or to provide load balancing and has received more and more attentions. In this paper, we present a multipath source routing protocol with some QoS guarantee. During the routing dis...

In path planning Problems, a complete description of robot geometry, environments and obstacle are presented; the main goal is routing, moving from source to destination, without dealing with obstacles. Also, the existing route should be optimal. The definition of optimality in routing is the same as minimizing the route, in other words, the best possible route to reach the destination. In most...

Journal: :IACR Cryptology ePrint Archive 2009
Tao Feng Xian Guo Jianfeng Ma Xinghua Li

The multi-path routing scheme provides reliable guarantee for mobile ad hoc network. A new method is proposed that is using to analyze the security of multi-path routing protocol within the framework of Universally Composable (UC) security. Based on the topological model that there exist adversarial nodes, the concept of plausible route is extended and the definition of plausible-route set is p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید